Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
84809eff629da3722a181a19f52c4c27e8355b6b916c367212085743c06cfcea.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
84809eff629da3722a181a19f52c4c27e8355b6b916c367212085743c06cfcea.dll
Resource
win10v2004-20240226-en
Target
84809eff629da3722a181a19f52c4c27e8355b6b916c367212085743c06cfcea
Size
666KB
MD5
91dbae558fc6f866e042e44e23f4d6d8
SHA1
4499f11fa428c4c674aeec902e759b28f3416b09
SHA256
84809eff629da3722a181a19f52c4c27e8355b6b916c367212085743c06cfcea
SHA512
f7f6fffc2191e94b5318f7341575970333e6dd3979571a7725581674f3e13bde6e3e5bfbee8f9f7f3ae3af83e34d1c7ebdd74b4d11bc5ebb497d165f7f01efb1
SSDEEP
12288:cvURiXdQubaE/yCDkpPum2ZuXEHNM0JpkoSjOlOf:cvCEbaQfGPD2ZuXEHNpkFjOlq
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
GetModuleHandleW
ExpandEnvironmentStringsW
DeleteFileW
FindClose
FindFirstFileW
FindNextFileW
GetDriveTypeW
GetLogicalDriveStringsW
GetTempFileNameW
GetTempPathW
GetTickCount
GetLastError
CreateMutexA
GetModuleFileNameA
ReadFile
WriteFile
CloseHandle
WideCharToMultiByte
CreatePipe
PeekNamedPipe
WaitForSingleObject
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
CreateProcessW
MultiByteToWideChar
GenerateConsoleCtrlEvent
FreeConsole
AttachConsole
SetConsoleCtrlHandler
GetTempPathA
GetTempFileNameA
ExitProcess
CreateThread
CreateProcessA
GetModuleFileNameW
MoveFileA
MoveFileExA
LoadLibraryA
GetProcAddress
Sleep
GetVolumeInformationA
DeleteFileA
GlobalFree
DuplicateHandle
GlobalAlloc
LoadLibraryW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
TryEnterCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
FreeLibrary
LoadLibraryExW
InterlockedPushEntrySList
InterlockedFlushSList
GetModuleHandleExW
HeapAlloc
HeapFree
HeapReAlloc
GetCurrentThread
GetACP
GetStdHandle
GetFileType
GetConsoleMode
ReadConsoleW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleCP
SetFilePointerEx
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetProcessHeap
SetStdHandle
CreateFileW
WriteConsoleW
HeapSize
SetEndOfFile
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
GetVersionExW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
QueryDepthSList
UnregisterWaitEx
CreateTimerQueue
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
SHGetFolderPathW
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ